<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id><journal-id journal-id-type="publisher-id">medinform</journal-id><journal-id journal-id-type="index">7</journal-id><journal-title>JMIR Medical Informatics</journal-title><abbrev-journal-title>JMIR Med Inform</abbrev-journal-title><issn pub-type="epub">2291-9694</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v12i1e52675</article-id><article-id pub-id-type="doi">10.2196/52675</article-id><article-categories><subj-group subj-group-type="heading"><subject>Viewpoint</subject></subj-group></article-categories><title-group><article-title>Unintended Consequences of Data Sharing Under the Meaningful Use Program</article-title></title-group><contrib-group><contrib contrib-type="author"><name name-style="western"><surname>Willcockson</surname><given-names>Irmgard Ursula</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Valdes</surname><given-names>Ignacio Herman</given-names></name><degrees>MS, MD</degrees><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff id="aff1"><institution>Astronaut, LLC</institution>, <addr-line>7505 Fannin Street, Suite 170</addr-line><addr-line>Houston</addr-line><addr-line>TX</addr-line>, <country>United States</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Lovis</surname><given-names>Christian</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Ehrsam</surname><given-names>Julien</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Heryawan</surname><given-names>Lukman</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Mun</surname><given-names>Michelle</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Gordon</surname><given-names>Stuart</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Ignacio Herman Valdes, MS, MD, Astronaut, LLC, 7505 Fannin Street, Suite 170, Houston, TX, 77054, United States, 1 7132492874; <email>ivaldes1@gmail.com</email></corresp></author-notes><pub-date pub-type="collection"><year>2024</year></pub-date><pub-date pub-type="epub"><day>14</day><month>11</month><year>2024</year></pub-date><volume>12</volume><elocation-id>e52675</elocation-id><history><date date-type="received"><day>12</day><month>09</month><year>2023</year></date><date date-type="rev-recd"><day>31</day><month>07</month><year>2024</year></date><date date-type="accepted"><day>17</day><month>08</month><year>2024</year></date></history><copyright-statement>&#x00A9; Irmgard Ursula Willcockson, Ignacio Herman Valdes. Originally published in JMIR Medical Informatics (<ext-link ext-link-type="uri" xlink:href="https://medinform.jmir.org">https://medinform.jmir.org</ext-link>), 14.11.2024. </copyright-statement><copyright-year>2024</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://medinform.jmir.org/">https://medinform.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://medinform.jmir.org/2024/1/e52675"/><abstract><p>Interoperability has been designed to improve the quality and efficiency of health care. It allows the Centers for Medicare and Medicaid Services to collect data on quality measures as a part of the Meaningful Use program. Covered providers who fail to provide data have lower rates of reimbursement. Unintended consequences also arise at each step of the data collection process: (1) providers are not reimbursed for the extra time required to generate data; (2) patients do not have control over when and how their data are provided to or used by the government; and (3) large datasets increase the chances of an accidental data breach or intentional hacker attack. After detailing the issues, we describe several solutions, including an appropriate data use review board, which is designed to oversee certain aspects of the process and ensure accountability and transparency.</p></abstract><kwd-group><kwd>electronic health records</kwd><kwd>EHR</kwd><kwd>medical record</kwd><kwd>interoperability</kwd><kwd>health information interoperability</kwd><kwd>clinical burden</kwd><kwd>Medicare</kwd><kwd>Medicaid</kwd><kwd>reimbursement</kwd><kwd>data science</kwd><kwd>data governance</kwd><kwd>data breach</kwd><kwd>cybersecurity</kwd><kwd>privacy</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Background</title><p>Interoperability has been an overarching goal of the American health care industry since the American Recovery and Reinvestment Act in 2009. Provider-to-provider sharing of patient information was designed to improve the safety, quality, and efficiency of patient care. The next target for interoperability was provider-to-patient sharing of information. The 21st Century Cures Act called for patients to have electronic access to their health care record [<xref ref-type="bibr" rid="ref1">1</xref>]. Health Level 7 Fast Healthcare Interoperability Resources was developed for secure data exchange between computer systems using different information storage methods [<xref ref-type="bibr" rid="ref2">2</xref>].</p><p>Interoperability is a prerequisite for meaningful use (MU). The Health Information Technology for Economic and Clinical Health Act, a component of the American Recovery and Reinvestment Act, included incentives for providers to adopt electronic health records (EHRs) as well as penalties for failing MU [<xref ref-type="bibr" rid="ref3">3</xref>]. The Meaningful Use program requires providers to share data with the Centers for Medicare and Medicaid Services (CMS) to ensure satisfactory health care quality. Using the Quality Reporting Document Architecture [<xref ref-type="bibr" rid="ref4">4</xref>], providers are required to submit data in support of the quality measures applicable to their practice. If covered providers do not submit data, their rate of reimbursement is reduced.</p><p>Although interoperability has been designed to improve the quality and efficiency of patient care, there are unintended consequences of data sharing. To date, few articles have examined the negative consequences of data sharing by providers to governmental entities [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Data must be generated before it can be shared, so this article begins with clinical data generation.</p></sec><sec id="s1-2"><title>Ethical Considerations</title><p>This study does not include human subject research (no human subject experimentation or intervention was conducted) and so does not require institutional review board (IRB) approval.</p></sec></sec><sec id="s2"><title>Data Generation</title><p>Data are generated by both providers and patients during a visit. While most data are generated to serve clinical needs, some are generated solely to satisfy later MU reporting.</p><sec id="s2-1"><title>Uniform Data Generation</title><p>The criteria for satisfying a particular MU requirement do not consider differences in specialty. For example, annual screening for depression is one MU measure (Centers for Medicare and Medicaid Services 2, version 12, 2023) [<xref ref-type="bibr" rid="ref7">7</xref>]. Patients with depression are frequently undiagnosed in general medicine settings and therefore remain untreated. Explicit screening for depression in these settings is important to identify patients and offer appropriate treatment [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Administering a validated screening instrument is one way to satisfy the screening portion of the MU requirement.</p><p>In contrast, psychiatrists screen patients for depression using implicit methods such as interviewing the patient [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. Requiring them to report an instrument score for each patient does not further the goal of identifying and treating patients with depression. It does, however, increase the burden of data collection and documentation on both the provider and patient.</p></sec><sec id="s2-2"><title>Proposed Solution: Broader Criteria for Meeting MU Requirements</title><p>Instead of forcing all providers to perform the same task to meet a particular MU requirement, providers should be allowed limited flexibility to decide how best to meet the intent of the requirement.</p></sec><sec id="s2-3"><title>Free-Rider Problem</title><p>In the broadest definition, a free rider receives a benefit without contributing to the cost of that benefit&#x2019;s production [<xref ref-type="bibr" rid="ref12">12</xref>]. Billing codes determine the provider&#x2019;s compensation for a given patient visit. These codes in part represent the amount of time spent on a given activity. However, there is no billing code for collecting data only required for CMS reporting. Providers are penalized for not providing the data but are not compensated for their time spent; thus, the CMS is acting as a free rider.</p></sec><sec id="s2-4"><title>Proposed Solution: Current Procedural Terminology Code Modifiers</title><p>Current Procedural Terminology code modifiers further describe a procedure code without changing its definition [<xref ref-type="bibr" rid="ref13">13</xref>]. Creating a modifier specifically for MU data collection would allow providers to bill for the time spent on clinical data collection. Additional payment for data collection should be made by the CMS, since it receives the reports.</p></sec></sec><sec id="s3"><title>Data Ownership</title><sec id="s3-1"><title>Access to Data</title><p>Ownership of data has philosophical implications that differ from ownership of real property [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. A more useful framework for understanding the consequences of MU data collection may be access to data. Patients have a compelling interest in managing their own data. Patients who do not trust their provider with safeguarding their data may withhold information, leading to adverse outcomes [<xref ref-type="bibr" rid="ref6">6</xref>]. This is especially true for marginalized groups [<xref ref-type="bibr" rid="ref16">16</xref>].</p><p>Despite advances in interoperability and data-sharing mandates [<xref ref-type="bibr" rid="ref1">1</xref>], neither providers nor patients can usually access all data pertaining to their role. Health care entities create data silos and deny access to patients and providers who are not, or are no longer, part of the entity. Data do not commonly follow patients who are seen by multiple providers. Outside of closed systems such as the Veterans Affairs, in which patients receive all care within the system, data do not follow providers who work in multiple health care settings, or who change jobs.</p></sec><sec id="s3-2"><title>Proposed Solution: Improved Interoperability Processes</title><p>While interoperability is constantly improving, the process of data sharing continues to be cumbersome. We propose the following process: When a patient begins receiving care at a particular entity, the consent form should include data sharing with providers outside of the entity. If the patient does not opt out, any provider who has the patient&#x2019;s demographics and certifies that they need access to protected health information (PHI) should receive it. Allowing patients to consent ahead of time lowers the burden on both the patients and the providers.</p></sec></sec><sec id="s4"><title>Data Sharing</title><sec id="s4-1"><title>Overview</title><p>Data can be shared with the CMS either by a provider via EHRs or by an insurance company. The CMS receives complete charts, including all PHI. Neither providers nor patients are directly involved in this process, and they may not know when or how often data sharing occurs.</p></sec><sec id="s4-2"><title>Calculating Compliance</title><p>Many MU measures include a numerical criterion. To calculate the percentage of patients who have had a particular test or screening requires collecting not only the charts of patients satisfying the measure (the numerator) but also the charts of patients not satisfying the measure (the denominator). In practice, this means that any chart may be included in any dataset, and that many charts are included in multiple datasets. Patients and providers have no control over this process and no way of knowing which charts are included in which dataset.</p></sec><sec id="s4-3"><title>Lack of Patient Consent</title><p>Patient consent forms include consent for sharing data with other members of their health care team, designated family members, and insurance companies. Currently, consent forms do not include sharing data with the CMS as part of MU requirements. Patients are unaware that their data are shared with the CMS, via their providers and their insurance companies, and have no mechanism to give or deny consent.</p></sec><sec id="s4-4"><title>Proposed Solution: Updated Consent Forms and Opt Outs</title><p>Including a section on data sharing with the CMS in patient consent forms is straightforward. Both providers and insurance companies can include a section explaining that PHI may be shared with the CMS and allow patients to opt out.</p><p>However, opting out could have unintended consequences. Some patients may hesitate to share any health data with the CMS. More patients may hesitate to share sensitive data, such as mental health or substance misuse data, with the CMS. Therefore, the CMS would need to decide how to handle compliance calculations. Giving patients the opportunity to opt out of data sharing also requires changes to EHR programming.</p></sec><sec id="s4-5"><title>Data Use and Potential Misuse</title><p>The intent of MU data collection is to improve the efficiency and effectiveness of health care. However, once collected, data can be used for any number of other purposes. At present, it is unclear what safeguards are in place to prevent other branches of government from accessing the data for their own purposes. For example, California allows a person to obtain a driver&#x2019;s license without proof of legal immigration status. The personal data collected can then be accessed by the Department of Homeland Security to perform civil immigration enforcement [<xref ref-type="bibr" rid="ref17">17</xref>].</p></sec><sec id="s4-6"><title>Data Breaches</title><p>The US government has experienced multiple data breaches over the last 15 years, both accidental and through hacking [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Improvements in processes at least partially address accidental breaches. Hacking by sophisticated foreign entities is more difficult to prevent. Hackers may be attracted by the combination of the volume of data and its potential sensitivity [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>].</p></sec><sec id="s4-7"><title>Proposed Solution: An Appropriate Data Use Review Board</title><p>We propose the creation of an independent board, modeled after an IRB, to address many of the concerns related to data collection and use. Research on human subjects requires the approval of an IRB [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. This requirement was put in place in the United States after a series of egregiously unethical experiments was conducted. Each IRB is required to have at least 5 members, with at least one whose main concern is scientific, one whose main concern is nonscientific, and one who is not affiliated with the academic institution in which the proposed research would take place.</p><p>As the data recipient is the CMS, a part of the federal government, we propose the following composition for an appropriate data use review board, made up of a minimum of 6 members to allow for group decision-making:</p><list list-type="bullet"><list-item><p>At least one member who is employed at the CMS</p></list-item><list-item><p>At least one member who is a clinician providing data</p></list-item><list-item><p>At least one member who represents patients</p></list-item><list-item><p>At least one member with communication experience</p></list-item><list-item><p>At least one member who is a biomedical informatician with big data expertise</p></list-item><list-item><p>At least one member who owns and operates a small market-share EHR software company</p></list-item></list><p>Each of the members of the appropriate data use review board has a critical role to play. As the data recipient, the CMS needs to lay out both the data required and the rationale behind collecting the data. The clinician and EHR owner provide important insight into the impact of data collection on workflows, as well as the feasibility of modifying software to streamline data collection and reporting. The patient representative provides the patients&#x2019; perspective as well as communication guidance. As any decision reached by the review board needs to be communicated clearly and effectively to patients, the communication specialist and patient representative would work together to craft and disseminate necessary information. The biomedical informatician can assist the CMS with deciding on data needs as well as suggest the most current data analysis methods. They can also help the patient representative and communication specialist explain different ways to protect patient data from unauthorized disclosure.</p><p>After an open application and vetting process, members to the board should be appointed by a bipartisan committee of the US House. Their term of service should be 4-5 years to allow members to become proficient in their roles.</p><p>Proposed uses of data should be approved by the committee and communicated to the public. Public input should be sought through a variety of means and become an important aspect of decision-making. Disclosure of data use and data breaches should be prompt and effective, without further compromising data security.</p></sec><sec id="s4-8"><title>Effect of MU on the EHR Ecosystem</title><p>MU requirements affect not only patients and providers but also EHR companies. MU certification and recertification is time consuming and costly. While EHR companies with a large market share can justify the expense and pass the cost on to their customers, companies with a smaller market share cannot. Lack of certification leads to decreased market share, thereby encouraging consolidation across the industry.</p><p>Consolidation may be advantageous to the government because it is easier to negotiate with fewer companies. However, consolidation leads to increased costs for providers and less competition. It makes independent, autonomous practice, away from corporate monocultures, very difficult. Customer service also suffers because customers have fewer choices.</p><p>Customer service is not the only casualty; innovation is also affected. Smaller companies are more likely to produce innovative products. However, given the high bar of MU certification, bringing these innovations to the market often proves to be cost prohibitive. Similarly, though open-source software has also driven down costs and spurred innovation [<xref ref-type="bibr" rid="ref26">26</xref>], given the expense associated with MU certification, many companies committed to open-source software have stopped providing their code freely.</p></sec></sec><sec id="s5" sec-type="conclusions"><title>Conclusion</title><p>MU was made possible by progressive advances in interoperability. While CMS data collection has the potential to advance health care, it leads to the aggregation of large datasets that are vulnerable to unintentional data breaches and data misuse. Since the data collection is largely invisible to both providers and patients, an appropriate data use review board is needed to protect all participants.</p></sec></body><back><ack><p>We want to thank Ross Koppel for insightful comments on an early draft of this paper.</p></ack><fn-group><fn fn-type="conflict"><p>IHV is the founder and chief executive officer of a small market-share electronic health record company.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">CMS</term><def><p>Centers for Medicare and Medicaid Services</p></def></def-item><def-item><term id="abb2">EHR</term><def><p>electronic health record</p></def></def-item><def-item><term id="abb3">IRB</term><def><p>institutional review board</p></def></def-item><def-item><term id="abb4">MU</term><def><p>meaningful use</p></def></def-item><def-item><term id="abb5">PHI</term><def><p>protected health information</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="web"><article-title>H.R.6 - 21st Century Cures Act</article-title><source>Congress.gov</source><year>2015</year><access-date>2024-11-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.congress.gov/bill/114th-congress/house-bill/6?s=1&#x0026;r=6">https://www.congress.gov/bill/114th-congress/house-bill/6?s=1&#x0026;r=6</ext-link></comment></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="web"><article-title>What is HL7 FHIR?</article-title><source>Office of the National Coordinator for Health Information Technology</source><access-date>2024-11-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.healthit.gov/sites/default/files/page/2021-04/What%20Is%20FHIR%20Fact%20Sheet.pdf">https://www.healthit.gov/sites/default/files/page/2021-04/What%20Is%20FHIR%20Fact%20Sheet.pdf</ext-link></comment></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="web"><article-title>H.R.1 - American Recovery and Reinvestment Act of 2009</article-title><source>Congress.gov</source><year>2009</year><access-date>2024-11-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.congress.gov/bill/111th-congress/house-bill/1?s=10&#x0026;r=1">https://www.congress.gov/bill/111th-congress/house-bill/1?s=10&#x0026;r=1</ext-link></comment></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Sethi</surname><given-names>K</given-names> </name></person-group><article-title>Introduction to QRDA</article-title><source>eCQI Resource Center</source><year>2015</year><month>08</month><day>12</day><access-date>2024-11-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://ecqi.healthit.gov/system/files/qrda_basics_08_12_2015_a_508.pdf">https://ecqi.healthit.gov/system/files/qrda_basics_08_12_2015_a_508.pdf</ext-link></comment></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Spithoff</surname><given-names>S</given-names> </name><name name-style="western"><surname>Stockdale</surname><given-names>J</given-names> </name><name name-style="western"><surname>Rowe</surname><given-names>R</given-names> </name><name name-style="western"><surname>McPhail</surname><given-names>B</given-names> </name><name name-style="western"><surname>Persaud</surname><given-names>N</given-names> </name></person-group><article-title>The commercialization of patient data in Canada: ethics, privacy and policy</article-title><source>CMAJ</source><year>2022</year><month>01</month><day>24</day><volume>194</volume><issue>3</issue><fpage>E95</fpage><lpage>E97</lpage><pub-id pub-id-type="doi">10.1503/cmaj.210455</pub-id><pub-id pub-id-type="medline">35074837</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Turner</surname><given-names>GM</given-names> </name><name name-style="western"><surname>Monaco</surname><given-names>C</given-names> </name></person-group><article-title>Doctor-patient relationship compromised by 'oppressive' quality reporting requirements</article-title><source>Forbes</source><year>2018</year><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.forbes.com/sites/gracemarieturner/2018/04/05/doctor-patient-relationship-compromised-by-oppressive-quality-reporting-requirements/">https://www.forbes.com/sites/gracemarieturner/2018/04/05/doctor-patient-relationship-compromised-by-oppressive-quality-reporting-requirements/</ext-link></comment></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="web"><article-title>Quality ID #134: preventive care and screening: screening for depression and follow-up plan</article-title><source>Quality Payment Program</source><access-date>2024-11-05</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://qpp.cms.gov/docs/QPP_quality_measure_specifications/CQM-Measures/2023_Measure_134_MIPSCQM.pdf">https://qpp.cms.gov/docs/QPP_quality_measure_specifications/CQM-Measures/2023_Measure_134_MIPSCQM.pdf</ext-link></comment></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bailey</surname><given-names>RK</given-names> </name><name name-style="western"><surname>Mokonogho</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kumar</surname><given-names>A</given-names> </name></person-group><article-title>Racial and ethnic differences in depression: current perspectives</article-title><source>Neuropsychiatr Dis Treat</source><year>2019</year><month>02</month><day>22</day><volume>15</volume><fpage>603</fpage><lpage>609</lpage><pub-id pub-id-type="doi">10.2147/NDT.S128584</pub-id><pub-id pub-id-type="medline">30863081</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Goodwin</surname><given-names>RD</given-names> </name><name name-style="western"><surname>Dierker</surname><given-names>LC</given-names> </name><name name-style="western"><surname>Wu</surname><given-names>M</given-names> </name><name name-style="western"><surname>Galea</surname><given-names>S</given-names> </name><name name-style="western"><surname>Hoven</surname><given-names>CW</given-names> </name><name name-style="western"><surname>Weinberger</surname><given-names>AH</given-names> </name></person-group><article-title>Trends in U.S. depression prevalence from 2015 to 2020: the widening treatment gap</article-title><source>Am J Prev Med</source><year>2022</year><month>11</month><volume>63</volume><issue>5</issue><fpage>726</fpage><lpage>733</lpage><pub-id pub-id-type="doi">10.1016/j.amepre.2022.05.014</pub-id><pub-id pub-id-type="medline">36272761</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nordgaard</surname><given-names>J</given-names> </name><name name-style="western"><surname>Sass</surname><given-names>LA</given-names> </name><name name-style="western"><surname>Parnas</surname><given-names>J</given-names> </name></person-group><article-title>The psychiatric interview: validity, structure, and subjectivity</article-title><source>Eur Arch Psychiatry Clin Neurosci</source><year>2013</year><month>06</month><volume>263</volume><issue>4</issue><fpage>353</fpage><lpage>364</lpage><pub-id pub-id-type="doi">10.1007/s00406-012-0366-z</pub-id><pub-id pub-id-type="medline">23001456</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nordgaard</surname><given-names>J</given-names> </name><name name-style="western"><surname>Parnas</surname><given-names>J</given-names> </name></person-group><article-title>A semi structured, phenomenologically-oriented psychiatric interview: descriptive congruence in assessing anomalous subjective experience and mental status</article-title><source>Clin Neuropsychiatry</source><year>2012</year><month>06</month><access-date>2024-11-04</access-date><volume>9</volume><issue>3</issue><fpage>1</fpage><lpage>6</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://www.clinicalneuropsychiatry.org/download/a-semi-structured-phenomenologically-oriented-psychiatric-interview-descriptive-congruence-in-assessing-anomalous-subjective-experience-and-mental-status/">https://www.clinicalneuropsychiatry.org/download/a-semi-structured-phenomenologically-oriented-psychiatric-interview-descriptive-congruence-in-assessing-anomalous-subjective-experience-and-mental-status/</ext-link></comment></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Hardin</surname><given-names>R</given-names> </name></person-group><article-title>The free rider problem</article-title><source>Stanford Encyclopedia of Philosophy</source><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://plato.stanford.edu/entries/free-rider/">https://plato.stanford.edu/entries/free-rider/</ext-link></comment></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="web"><article-title>What are CPT code modifiers? how are they used?</article-title><source>Medical Billing Analysts</source><year>2022</year><month>01</month><day>10</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.medicalbillinganalysts.com/what-are-cpt-code-modifiers-how-are-they-used">https://www.medicalbillinganalysts.com/what-are-cpt-code-modifiers-how-are-they-used</ext-link></comment></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hummel</surname><given-names>P</given-names> </name><name name-style="western"><surname>Braun</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dabrock</surname><given-names>P</given-names> </name></person-group><article-title>Own data? ethical reflections on data ownership</article-title><source>Philos Technol</source><year>2021</year><month>09</month><volume>34</volume><issue>3</issue><fpage>545</fpage><lpage>572</lpage><pub-id pub-id-type="doi">10.1007/s13347-020-00404-9</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Evans</surname><given-names>BJ</given-names> </name></person-group><article-title>Much ado about data ownership</article-title><source>Harv J Law Technol</source><year>2011</year><access-date>2024-11-04</access-date><volume>25</volume><issue>1</issue><fpage>70</fpage><lpage>113</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://jolt.law.harvard.edu/assets/articlePDFs/v25/25HarvJLTech69.pdf">https://jolt.law.harvard.edu/assets/articlePDFs/v25/25HarvJLTech69.pdf</ext-link></comment></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nong</surname><given-names>P</given-names> </name><name name-style="western"><surname>Williamson</surname><given-names>A</given-names> </name><name name-style="western"><surname>Anthony</surname><given-names>D</given-names> </name><name name-style="western"><surname>Platt</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kardia</surname><given-names>S</given-names> </name></person-group><article-title>Discrimination, trust, and withholding information from providers: implications for missing data and inequity</article-title><source>SSM Popul Health</source><year>2022</year><month>04</month><day>7</day><volume>18</volume><fpage>101092</fpage><pub-id pub-id-type="doi">10.1016/j.ssmph.2022.101092</pub-id><pub-id pub-id-type="medline">35479582</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="web"><article-title>How California driver&#x2019;s license records are shared with the Department of Homeland Security</article-title><source>National Immigration Law Center</source><year>2018</year><month>12</month><day>16</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.nilc.org/issues/immigration-enforcement/how-calif-dl-records-shared-with-dhs/">https://www.nilc.org/issues/immigration-enforcement/how-calif-dl-records-shared-with-dhs/</ext-link></comment></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Lord</surname><given-names>N</given-names> </name></person-group><article-title>Top 10 biggest government data breaches of all time in the U.S</article-title><source>Digital Guardian</source><year>2024</year><month>08</month><day>22</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.digitalguardian.com/blog/top-10-biggest-us-government-data-breaches-all-time">https://www.digitalguardian.com/blog/top-10-biggest-us-government-data-breaches-all-time</ext-link></comment></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Thrush</surname><given-names>G</given-names> </name><name name-style="western"><surname>Cameron</surname><given-names>C</given-names> </name></person-group><article-title>Hackers breach U.S. marshall system with sensitive personal data</article-title><source>The New York Times</source><year>2023</year><month>02</month><day>27</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.nytimes.com/2023/02/27/us/politics/us-marshals-ransomware-hack.html">https://www.nytimes.com/2023/02/27/us/politics/us-marshals-ransomware-hack.html</ext-link></comment></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Fung</surname><given-names>B</given-names> </name></person-group><article-title>Why the US government hack is literally keeping security experts awake at night</article-title><source>CNN</source><year>2020</year><month>12</month><day>16</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.cnn.com/2020/12/16/tech/solarwinds-orion-hack-explained/index.html">https://www.cnn.com/2020/12/16/tech/solarwinds-orion-hack-explained/index.html</ext-link></comment></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="web"><article-title>Cybersecurity resource center</article-title><source>US Office of Personnel Management</source><access-date>2024-11-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.opm.gov/cybersecurity-resource-center/">https://www.opm.gov/cybersecurity-resource-center/</ext-link></comment></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Basil</surname><given-names>NN</given-names> </name><name name-style="western"><surname>Ambe</surname><given-names>S</given-names> </name><name name-style="western"><surname>Ekhator</surname><given-names>C</given-names> </name><name name-style="western"><surname>Fonkem</surname><given-names>E</given-names> </name></person-group><article-title>Health records database and inherent security concerns: a review of the literature</article-title><source>Cureus</source><year>2022</year><month>10</month><day>11</day><volume>14</volume><issue>10</issue><fpage>e30168</fpage><pub-id pub-id-type="doi">10.7759/cureus.30168</pub-id><pub-id pub-id-type="medline">36397924</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Brown</surname><given-names>ML</given-names> </name><name name-style="western"><surname>Brown</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Nikakhtar</surname><given-names>N</given-names> </name></person-group><article-title>Personal health data at risk of foreign exploitation</article-title><source>Wiley</source><year>2022</year><month>02</month><day>2</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.wiley.law/alert-Personal-Health-Data-at-Risk-of-Foreign-Exploitation">https://www.wiley.law/alert-Personal-Health-Data-at-Risk-of-Foreign-Exploitation</ext-link></comment></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="web"><article-title>Institutional review boards (IRBs) and protection of human subjects in clinical trials</article-title><source>US Food and Drug Administration</source><year>2019</year><month>09</month><day>11</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.fda.gov/about-fda/center-drug-evaluation-and-research-cder/institutional-review-boards-irbs-and-protection-human-subjects-clinical-trials">https://www.fda.gov/about-fda/center-drug-evaluation-and-research-cder/institutional-review-boards-irbs-and-protection-human-subjects-clinical-trials</ext-link></comment></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Moon</surname><given-names>MR</given-names> </name></person-group><article-title>The history and role of institutional review boards: a useful tension</article-title><source>Virtual Mentor</source><year>2009</year><month>04</month><day>1</day><access-date>2024-10-11</access-date><volume>11</volume><issue>4</issue><fpage>311</fpage><lpage>321</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://journalofethics.ama-assn.org/sites/joedb/files/2018-06/pfor1-0904_0.pdf">https://journalofethics.ama-assn.org/sites/joedb/files/2018-06/pfor1-0904_0.pdf</ext-link></comment><pub-id pub-id-type="doi">10.1001/virtualmentor.2009.11.4.pfor1-0904</pub-id><pub-id pub-id-type="medline">23195065</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Brock</surname><given-names>A</given-names> </name></person-group><article-title>What is open source, and why does it matter today?</article-title><source>Open Access Government</source><year>2022</year><month>02</month><day>8</day><access-date>2024-10-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.openaccessgovernment.org/open-source-technology/129261/">https://www.openaccessgovernment.org/open-source-technology/129261/</ext-link></comment></nlm-citation></ref></ref-list></back></article>